Pattern of leaks suggests Snowden ‘may have been a Russian spy’
May 12, 2014 7 Comments
By JOSEPH FITSANAKIS | intelNews.org
It has been nearly a year since British newspaper The Guardian unveiled the identity of American defector Edward Snowden, whom Pentagon Papers leaker Daniel Ellsberg has called the source of the most significant leak in the history of the United States. The case of Snowden, a former computer technician for the United States Intelligence Community, who is currently under Russian protection, continues to divide Americans. His defenders see him as a heroic whistleblower who sacrificed his comfortable life and promising career in order to expose the government’s encroachment into the private lives of American citizens. His detractors want him to account for stealing nearly 2 million classified documents and sharing American secrets with Moscow. Last January, American lawmakers with senior positions in Congressional intelligence committees expressed strong views that Snowden was working with Russian intelligence prior to his defection. Last Friday, American investigative journalist Edward Jay Epstein appeared to side with Snowden’s detractors. Writing in The Wall Street Journal, Epstein opined that the narrative of Snowden acting alone to bravely expose “the evils of government surveillance” was likely created by Snowden himself. But this popular whistleblowing narrative, said Epstein, is “at best incomplete [and] at worst fodder for the naïve”. The veteran journalist argued that Snowden’s heroic image seems to suffer when one considers his sleuthing actions prior to his defection. Specifically, the American defector left for Hong Cong, and eventually Russia, after having broken into at least 24 carefully compartmentalized areas of electronically stored classified intelligence inside the NSA. To do so, the computer expert had to consciously borrow, steal or forge multiple entry passwords. Once he had gained access to the compartmentalized systems, he planted “spiders”, stealthy intelligence-collection programs that looked for specifically targeted data to steal. This, says Epstein, is how Snowden managed to acquire 1.7 million documents from the Kunia Regional SIGINT Operations Center on the island of Hawaii, where he was stationed. What is interesting, argues Epstein, is that only “a minute fraction” of the documents stolen by Snowden were related to domestic surveillance by American government agencies. The journalist quotes General Martin Dempsey, Chairman of the Joint Chiefs of Staff, who said last March that the vast majority of the documents sought out by Snowden were related to America’s military capabilities. Read more of this post



















The mysterious Chinese unit behind the cyberespionage charges
May 20, 2014 by Joseph Fitsanakis 2 Comments
On Monday, the United States government leveled for the first time charges against a group of identified Chinese military officers, allegedly for stealing American trade secrets through cyberespionage. The individuals named in the indictment are all members of a mysterious unit within the Chinese People’s Liberation Army (PLA) command structure, known as Unit 61398. It is estimated that the unit has targeted at least 1,000 private or public companies and organizations in the past 12 years. Western cybersecurity experts often refer to the group as “APT1”, which stands for “Advanced Persistent Threat 1”, or “Byzantine Candor”. It is believed to operate under the Second Bureau of the PLA’s General Staff Department, which is responsible for collecting foreign military intelligence. Many China military observers argue that Unit 61398 is staffed by several thousand operatives, who can be broadly categorized into two groups: one consisting of computer programmers and network operations experts, and the other consisting of English-language specialists, with the most talented members of the Unit combining both skills. Computer forensics experts have traced the Unit’s online activities to several large computer networks operating out of Shanghai’s Pudong New Area district, a heavily built neighborhood in China’s largest city, which serves as a symbol of the country’s rapid industrialization and urbanization. Among other things, Unit 61398 is generally accused of being behind Operation SHADY RAT, one of history’s most extensive known cyberespionage campaigns, which targeted nearly 100 companies, governments and international organizations, between 2006 and 2011. The operation is believed to be just one of numerous schemes devised by Unit 61398 in its effort to acquire trade secrets from nearly every country in the world during the past decade, say its detractors. American sources claim that the PLA Unit spends most of its time attacking private, rather than government-run, networks and servers. As the US Attorney General, Eric Holder, told reporters on Monday, Unit 61398 conducts hacking “for no reason other than to advantage state-owned companies and other interests in China, at the expense of businesses here in the United States”. But The Washington Post points out that the recent revelations by US intelligence defector Edward Snowden arguably make it “easier for China to dismiss” Washington’s charges, since they point to Read more of this post
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with Advanced Persistent Threat 1, Analysis, Byzantine Candor, China, Chinese People's Liberation Army, computer hacking, cyberespionage, economic espionage, News, operation SHADY RAT, Unit 61398